shutterstock 9311 TEST SIZE V3 051016

 

 "Fast Response Times and Resolutions."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Actually, this is a very bad idea, as it puts your device at serious risk. There are a few reasons why this is the case.

Manufacturer Differences
When whichever company produced your laptop did so, it did so in a very specific way. This includes the charger that comes with the laptop. Trying a different manufacturer’s charger with your laptop will almost certainly damage your battery. Best case scenario, your laptop’s battery will reject the charger. You should only ever use a charger that was produced by the device’s manufacturer, even if another charger appears to supply the same amount of power.

On the subject of power…

Different Power Requirements
Like we mentioned before, your laptop’s original charger was specifically manufactured to your laptop’s specifications. As a result, the charger is made to supply exactly how much power your device needs. A charger from a different manufacturer might supply too much or too little power, potentially damaging the battery or the laptop’s other hardware.

Why You Should Avoid Cheap Off-Brand Chargers
If it’s bad to utilize another established brand’s charger, it’s worse to subject your laptop to a knock-off, no-name charger. There is no guarantee that the charger is of a trustworthy quality, as well as no way to tell if its alleged power output is actually what it sends into your device. If you do need to replace your charger, or you just want a spare, invest in the real McCoy. Otherwise, your short-term costs savings may translate into the cost of a new device.

Have you ever found yourself without a charger and tempted to borrow someone else’s? What happened if and when your battery died? Share your experience with us in the comments!

Using Cortana Gets Better with Customization
Tip of the Week: How to Type Accent Marks and Symb...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business communications Business Continuity bgc Email roundup Internet nonprofit Software Alert IT Services User Tips Innovation Managed IT Services Outsourced IT Hardware Smartphones Tech Term Data Backup Productivity Windows 10 Managed IT Services Browser Saving Money Computer Smartphone Cloud Computing Ransomware Efficiency Server Data Recovery IT Support Android Workplace Tips Cybercrime Internet of Things Network BDR Computers IT Support Business Management Small Business Communication Productivity Office Cybersecurity Miscellaneous Windows Passwords Quick Tips Artificial Intelligence Save Money Telephone Systems Holiday BYOD Chrome Applications Windows 10 Router Recovery Managed IT Money Gadgets Social Engineering Mobile Device Management Mobile Device Mobility Automation Wi-Fi Work/Life Balance Social Media Virtualization Office 365 Collaboration Hacking Phishing Upgrade Law Enforcement Facebook Proactive IT Private Cloud Firewall Vulnerability Health How To Microsoft Office Password Compliance Managed Service Provider Remote Monitoring Google Drive VPN Word Two-factor Authentication Office Tips Budget Data Protection Avoiding Downtime Flexibility Bandwidth Bring Your Own Device App Information Software as a Service Mobile Computing Value Connectivity Data Security Servers Encryption Managed Service Identity Theft Safety Business Intelligence Information Technology History Data Breach HaaS Save Time Black Market Remote Computing Spam Operating System Apps Sports Scam Settings Keyboard Redundancy Voice over Internet Protocol Electronic Medical Records CES Battery Content Filtering Entertainment Comparison IT Plan Wireless Technology Worker Business Owner YouTube Update PDF Content Management Employer-Employee Relationship Emergency Government Computing Infrastructure Big Data Solid State Drive Unified Threat Management Access Control Spam Blocking Marketing Document Management WiFi Hiring/Firing Blockchain Virtual Assistant Credit Cards SaaS Hacker Cleaning Legal HIPAA Training Workers Risk Management The Internet of Things Physical Security Google Docs Human Resources Telephone System Windows 7 Fraud Computer Care Telephony Patch Management Infrastructure Paperless Office Unsupported Software Automobile OneNote Data Storage Website End of Support Samsung Data storage Machine Learning USB Charger Data Management IT Management Net Neutrality Meetings Reputation Advertising Leadership Cryptocurrency Excel Remote Work Video Games Audit Warranty Monitor Start Menu Colocation Unified Communications Transportation Business Mangement Current Events HVAC Troubleshooting Hard Drives Inventory Wiring Botnet Robot Going Green Online Shopping Public Computer Scalability Wireless Internet Experience Multi-Factor Security Shortcuts ISP Data loss Customers Education Safe Mode Tip of the week Loyalty Devices Computer Fan Printer Tools Theft Benefits Gmail Knowledge Networking HBO Relocation Specifications Smartwatch Flash Files Evernote Cortana Wire Trending Rootkit Techology Accountants MSP Social Thought Leadership FENG Mouse Screen Mirroring Microchip Windows Server 2008 Smart Technology Recycling Network Congestion Shadow IT Enterprise Content Management Books Outlook Humor Millennials Authentication Windows 10s Employee Sync Wireless Charging Google Apps Instant Messaging Smart Office Data Warehousing Lifestyle File Sharing Vendor Twitter Administrator Cast Employer Employee Relationship webinar Users Search Engine Apple Mobile Internet Exlporer Two Factor Authentication eWaste Password Management Hosted Solution Workforce Best Practice Nanotechnology Public Cloud Content Camera Digital Signage Laptop Fiber-Optic IBM Search Chromecast Vendor Management Practices Augmented Reality Display Assessment Addiction Politics Computer Accessories Staff Conferencing Virtual Reality Regulation Bing Regulations iPhone Amazon Professional Services Criminal IT Consultant NIST Frequently Asked Questions Telecommuting Smart Tech Audiobook Printers Google Search Skype Touchpad User Error Cables Password Manager Supercomputer How to Software Tips Hosted Computing Remote Worker Security Cameras Amazon Web Services Television Cache CrashOverride NarrowBand Wireless Bluetooth Digital Signature Netflix Worker Commute Help Desk Downtime GDPR Thank You nonprofits E-Commerce Congratulations